Hillstone Networks does not use Intel-chip in its NGFW

At beginning of 2018, a CPU vulnerability news shocking the whole security industry. According to the Register, a fundamental design flaw in the Intel-chip has forced a significant redesign of the Linux and Windows kernels to defang the chip-level security bug. The bug is present in modern Intel processors produced in the past decade. It allows normal user programs – from database applications to JavaScript in web browsers – to discern to some extent the layout or contents of protected kernel memory areas.

 

These have been helpfully grouped into two vulnerabilities: Spectre, and Meltdown. Spectre allows, among other things, user-mode applications to extract information from other processes running on the same system. Alternatively, it can be used by code to extract information from its own process. Meltdwon can be exploited by normal programs to read the contents of private kernel memory.

 

Hillstone Networks E Series Next Generation Firewall use the MIPS-based Cavium processor, instead of an Intel-chip. There is currently no report of this vulnerability for this processor.

 

More information can be found via Hillstone Networks.

 

For an answer to all of your questions or more information, please contact our sales department.

 

Or require a demo so we can demonstrate you how the products of Hillstone Networks work.